πŸ›‘ Cybersecurity & Privacy πŸ›‘ - News
25.9K subscribers
89.2K links
πŸ—ž The finest daily news on cybersecurity and privacy.

πŸ”” Daily releases.

πŸ’» Is your online life secure?

πŸ“© lalilolalo.dev@gmail.com
Download Telegram
πŸ” 70% of business report Pass the Hash attacks directly impact operational costs πŸ”

Ignorance surrounding Pass the Hash attacks puts the majority of businesses at risk of compromised credentials.

πŸ“– Read

via "Security on TechRepublic".
❌ Privacy Groups: Ring’s Police Partnerships Can Lead to Sinister Ends ❌

Increasing concerns over unauthorized surveillance, integration with facial recognition and more are plaguing the doorbell-video camera company.

πŸ“– Read

via "Threatpost".
πŸ•΄ Twitter Slip-Up Spills MFA Phone Numbers, Emails to Advertisers πŸ•΄

Email addresses and phone numbers provided to secure user accounts were accidentally shared with marketers.

πŸ“– Read

via "Dark Reading: ".
πŸ” Financial industry spending millions to deal with breaches in 2019 πŸ”

A new study says financial services organizations experienced an average of 10 attacks a year and spent an average of $1.3 million to restore services after each DNS attack.

πŸ“– Read

via "Security on TechRepublic".
πŸ•΄ A Realistic Threat Model for the Masses πŸ•΄

For many people, overly restrictive advice about passwords and other security practices is doing more harm than good. Here's why.

πŸ“– Read

via "Dark Reading: ".
πŸ” Tech Industry Group Urges EU to Reconsider ePrivacy πŸ”

A European tech organization is encouraging the European Commission to reconsider its proposal for ePrivacy Regulation, a proposal that's set to regulate cookie usage.

πŸ“– Read

via "Subscriber Blog RSS Feed ".
❌ Most Americans Fail Cybersecurity Quiz ❌

Study participants fail to correctly identify core security concepts and tools to help them stay safe online.

πŸ“– Read

via "Threatpost".
πŸ•΄ USB Drive Security Still Lags πŸ•΄

While USB drives are frequent pieces of business hardware, a new report says that one-third of US businesses have no policy governing their use.

πŸ“– Read

via "Dark Reading: ".
❌ Gamers Warned of High-Severity Intel, Nvidia Flaws ❌

The Intel NUC and Nvidia Shield both are vulnerable to high-severity flaws, Intel and Nvidia warned in dual advisories.

πŸ“– Read

via "Threatpost".
πŸ•΄ Security Tool Sprawl Reaches Tipping Point πŸ•΄

How a new open source initiative for interoperable security tools and a wave of consolidation could finally provide some relief for overwhelmed security analysts and SOCs.

πŸ“– Read

via "Dark Reading: ".
πŸ•΄ Virginia a Hot Spot For Cybersecurity Jobs πŸ•΄

State has highest number of people in information security roles and the most current job openings, Comparitech study finds.

πŸ“– Read

via "Dark Reading: ".
ATENTIONβ€Ό New - CVE-2017-2679

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-2678

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-2677

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
ATENTIONβ€Ό New - CVE-2017-2676

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: The CNA or individual who requested this candidate did not associate it with any vulnerability during 2017. Notes: none.

πŸ“– Read

via "National Vulnerability Database".
⚠ Job seekers are scrubbing clean their social media accounts ⚠

Most people nowadays are quite aware that hiring managers put their social media postings under a microscope, a new survey finds.

πŸ“– Read

via "Naked Security".
⚠ California outlaws facial recognition in police bodycams ⚠

The bill was introduced by Phil Ting: one of 26 state lawmakers misidentified as suspects in an ACLU test of the technology.

πŸ“– Read

via "Naked Security".
⚠ Twitter used 2FA phone numbers for targeted advertising ⚠

Twitter may have β€œinadvertently” handed phone and email data from some users to advertisers as part of its Tailored Audiences system that targets users’ feeds with ads.

πŸ“– Read

via "Naked Security".
❌ Apple iTunes Bug Actively Exploited in BitPaymer/iEncrypt Campaign ❌

Attackers exploit an β€œunquoted path” flaw in the Bonjour updater in iTunes for Windows to deliver ransomware attacks.

πŸ“– Read

via "Threatpost".
πŸ•΄ Network Security Must Transition into the Cloud Era πŸ•΄

An integrated approach is the best way to provide organizations with the tools they need to decrease the attack surface and use strong security controls.

πŸ“– Read

via "Dark Reading: ".